Purchasing through the Texas DIR

Solid Border is a HUB Vendor offering products from the manufacturers listed below to Texas governmental and public educational entities at discounted prices through DIR’s Information and Communications Technology Cooperative Contracts program.

Quotes & Orders

Customer must reference the appropriate DIR contract number, DIR-CPO-4850 or DIR-CPO-5843 when placing Purchase Orders

To request a quote, to place an order, or for more information, please contact:
Roberto Hofmann
[email protected]
(800) 213-8175

Pricing

DIR discounts are available for DIR customers only.

View DIR price lists and catalog.

Contracts

Contract DIR-TSO-5843

Software, including Software as a Service, Products and Related Services
Customers must reference DIR contract number DIR-TSO-5843 when placing Purchase Orders

Review DIR's list of TX-RAMP certified Cloud Products


View DIR price lists and catalog

  • Automox

    Windows Patch and Software Management
  • BeyondTrust

    Privileged Access Management (PAM) / Remote Access
  • Conceal

    Secure Browser and DLP
  • Druva

    Direct-to-cloud backup
  • RunZero

    Asset Discovery
  • SecureW2

    Cloud-based PKI and RADIUS
  • Sophos

    Anti-virus, encryption, and UTM
  • Trellix

    Network and endpoint threat prevention
  • Vectra Networks

    Internal APT defense

Contract DIR-CPO-4850

Information Technology Security (ITS) Hardware, Software and Services
Customers must reference DIR contract number DIR-CPO-4850 when placing Purchase Orders

View DIR price lists and catalog

  • Accellion

    Encrypted file sharing & collaboration
  • Armis

    Automated asset discovery / IoT security
  • Barracuda Networks

    Email, web, network security, backup & archiving
  • BitSight

    Security Ratings
  • Bluecat Networks

    DNS, DHCP, & IP address management
  • CrowdStrike

    Next-generation endpoint protection, visibility and response
  • Cygilant

    Security Information and Event Management (SIEM) SaaS
  • Digital Defense

    Vulnerability Scanning / PCI Audits
  • Entrust

    PKI, 2FA, and SSL Certificates
  • ESET

    Endpoint anti-virus & encryption
  • Fudo Security

    Zero Trust Remote Access / Session recording
  • Ixia

    Taps, bypass switches, and performance testing
  • JAMF Software

    Apple device management
  • KnowBe4

    Security awareness training
  • McAfee

    Endpoint & network security, and data protection
  • Mimecast

    Granular email security
  • Netscout

    Network and application quality assurance
  • OPSWAT

    Network Access Control (NAC) / Malware Analysis
  • Palo Alto Networks

    Next-generation firewalls, endpoint prevention, & cloud security
  • Proofpoint

    Enterprise email security
  • Radware

    DDOS protection & link/load balancing
  • Rapid7

    Vulnerability management, User-Behavior Analytics, and SIEM
  • Red Seal

    Security & network device configuration analysis
  • Red Sift

    DMARC Management and Anti-Spoofing
  • SafeGuard Cyber

    Digital and Social Risk Protection
  • Scalable

    IT asset management
  • Sophos

    Anti-virus, encryption, and UTM
  • Thycotic

    Password and authentication management
  • TokenEx

    Cloud-based tokenization / database security
  • V3 Cybersecurity

    NIST Cybersecurity Compliance & Maturity Platform